In this spreadsheet, our Blockchain/Distributed Ledger Working Group delivers a fully implementable security controls checklist for the blockchain framework Corda Enterprise 4.8. These controls are aligned with the NIST Cybersecurity Framework’s controls to proactively prevent, detect and respond to the risks of Fabric 2.0, thus mitigating the business impacts downstream caused by loss of trade, trust, and ownership.
In the accompanying Corda Enterprises 4.8 - Architecture Security Report, we identify the cybersecurity risks of implementing Corda Enterprises 4.8’s architecture as a permissioned blockchain enterprise network for a trade finance business in a cloud-based environment. Steps 1-6 of the section "Threat Model Analysis as per STRIDE Model" explain in detail how this Security Controls Checklist was derived.
Key Takeaways:
- The description of each identified Corda Enterprise 4.8 vulnerability
- The description of each control that can be used to mitigate these vulnerabilities
- How the controls map to NISTv5(SP 800-53 Rev. 5), the standard reference for security controls
Download this Resource
Prefer to access this resource without an account? Download it now.
Best For:
CISOs / CTOs / CIOs
Security Architects
Application Developers
System and Security Administrators
Security Architects
Application Developers
System and Security Administrators





